These new lT-enabled
forms of communication can imply
new risks due to the inappropriate
use of increasing amounts
of information
u e s t - c o l u m n
Tips for acquiring good habits
Point 1: Protect your personal computer (PC) and portable
devices.
•
Install the latest security, antivirus, and firewall updates to
protect against viruses and hackers.
•
Analyse on a regular basis, with the antivirus program your
equipment and USB devices and make security backups to
protect against the possible loss and harm of data.
•
Avoid connection to non-reliable websites and deactivate
wireless connections to prevent possible intrusion in the de-
vices.
Point 2: Protect your identity and personal information.
•
Don’t disclose your personal data unless
it strictly necessary.
•
To control your information on the network, be careful about
the data you include in social networks, not just yours, but
also those of third parties.
•
Manage your passwords in a secure manner
(use strong passwords, change them regularly, and use a
different password for your various accounts).
Point 3: protect business information also when outside
your organization.
•
Safeguard at all times mobile devices (laptop, cell phone,
and table) when out of the office or away from home, parti-
cularly in public places to prevent theft or loss.
•
Avoid disclosing confidential information in public places:
protect the screen of the device from being seen by other
parties, avoid telephone conversations when there are
people around, etc.
Point 4: Connect carefully.
•
Be very careful when using public PC and Wi-Fi access
points: ensure that communications are encrypted (URLs
in the browser begin with https) and restrict forwarding of
private, confidential or job-related information.
•
Do not open or forward unsolicited mail or from unknown
parties: if you have any doubts about the source or content
of the electronic mail, directly delete it.
Point 5: Surf the web carefully.
•
Be prudent and think before acting when surfing the web.
•
Be careful with information or messages that ask you to
perform an action immediately: do not download or share
applications with people you don’t trust.
•
Don’t trust actions that offer something that seems too
good to be true or when personal information that is not
necessary is requested.